Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks
Li Z., Shen H.  IEEE Transactions on Mobile Computing 11 (8): 1287-1303, 2012. Type: Article
Date Reviewed: Dec 3 2012

The topic of the paper is the distribution of tasks in mobile ad hoc networks (MANETs), where tasks are performed by the cooperating nodes. Node computing resources are limited by assumption, and selfish nodes are not interested in cooperation. To enforce node cooperation, the authors implemented an estimation system using the reputations of the nodes and the price for package transfer. Reputation ratings classify nodes as trustworthy and untrustworthy. Virtual money is used to measure the cost of packet-forwarding services. The game theory approach (see [1] for various applications of this methodology in computer science) is used to investigate the effectiveness of the system of incentives, compared to solutions without such motivation methods. The results are based on the simulation of the network equipped with the proposed reputation evaluation methods and information about the cost charged by the nodes for the transfer of packets. From this, the authors argue that a clever, rich, or selfish node can manipulate the operation of the network. Theoretical and simulation studies of the interaction of nodes show the superiority of the proposed integrated system in finding a solution using individual assessments of reputation and valuation of node services.

The game theory approach to the analysis of packet forwarding in MANETs is the subject of many research projects [2,3]. The main aim of existing models is to construct the strategy of individual nodes based on payoffs for service--their own and that of others. This paper tries to solve the challenge of encouraging the nodes to cooperate in order to maximize the overall system benefit.

Reviewer:  Krzysztof Szajowski Review #: CR140712 (1303-0228)
1) Alpcan, T.; Basar, T. Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge, UK, 2011.
2) Felegyhazi, M.; Buttyan, L.; Hubaux, J. P. Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Trans. Mobile Computing 5, 5(2006), 463–476.
3) Kameda, H.; Altman, E. Inefficient noncooperation in networking games of common-pool resources. IEEE J. Selected Areas in Comm. 26, 7(2008), 1260–1268.
Bookmark and Share
  Reviewer Selected
Wireless Communication (C.2.1 ... )
Distributed Systems (C.2.4 )
Performance of Systems (C.4 )
Would you recommend this review?
Other reviews under "Wireless Communication": Date
Joint pre-processing co-channel interference cancellation for single user MIMO
Hiep P., Son V.  Wireless Networks 22(8): 2597-2606, 2016. Type: Article
Apr 4 2017
A new asset tracking architecture integrating RFID, Bluetooth low energy tags and ad hoc smartphone applications
Bisio I., Sciarrone A., Zappatore S.  Pervasive and Mobile Computing 31(C): 79-93, 2016. Type: Article
Mar 31 2017
Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks
Salehi M., Boukerche A., Darehshoorzadeh A.  Ad Hoc Networks 5088-101, 2016. Type: Article
Nov 16 2016

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy